Was Amazon’s Jeff Bezos Hacked?
Bezos’ security chief wrote an article in The Daily Beast this week asserting that Bezos’ phone had been compromised by the Saudis, possibly in collusion with Enquirer publisher American Media Inc.
TEMPEST and EMSEC: Is it possible to use electromagnetic waves in cyberattacks?
TEMPEST is a code name that refers to research and studies about unintentional emanations from electronic devices that can leak classified information.
10 Social Media Scams and How to Spot Them
It’s no secret that people love social media. Whether it’s Facebook which has over 2 billion active users as of October 2018, Instagram with its…
Supply Chain Attack Targets ASUS Through Backdoored Update
ASUS users victim to supply chain attack: A compromised security update was pushed out to nearly 1 million users last year using the Asus Live Update tool.
How to protect your privacy in a surveillance state
Everything you do online is monitored and recorded. Here’s how you can regain some control of your privacy
Are Children using Google Docs to chat and bully each other?
The most recent trend amongst the youngsters is to use Google Docs documents as chat rooms where they share links, photos, and memes.
How to avoid zero-day attacks
Coming across an unpatched vulnerability and using it to carry out a zero-day attack is the dream for many cyberattackers.